CVE-2026-23270

Source
https://cve.org/CVERecord?id=CVE-2026-23270
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23270.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-23270
Downstream
Published
2026-03-18T17:54:43.803Z
Modified
2026-04-02T13:12:19.385396Z
Summary
net/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks
Details

In the Linux kernel, the following vulnerability has been resolved:

net/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks

As Paolo said earlier [1]:

"Since the blamed commit below, classify can return TCACTCONSUMED while the current skb being held by the defragmentation engine. As reported by GangMin Kim, if such packet is that may cause a UaF when the defrag engine later on tries to tuch again such packet."

actct was never meant to be used in the egress path, however some users are attaching it to egress today [2]. Attempting to reach a middle ground, we noticed that, while most qdiscs are not handling TCACTCONSUMED, clsact/ingress qdiscs are. With that in mind, we address the issue by only allowing actct to bind to clsact/ingress qdiscs and shared blocks. That way it's still possible to attach act_ct to egress (albeit only with clsact).

[1] https://lore.kernel.org/netdev/674b8cbfc385c6f37fb29a1de08d8fe5c2b0fbee.1771321118.git.pabeni@redhat.com/ [2] https://lore.kernel.org/netdev/cc6bfb4a-4a2b-42d8-b9ce-7ef6644fb22b@ovn.org/

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23270.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0b5b831122fc3789fff75be433ba3e4dd7b779d4
Fixed
fb3c380a54e33d1fd272cc342faa906d787d7ef1
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
73f7da5fd124f2cda9161e2e46114915e6e82e97
Fixed
5a110ddcc99bda77a28598b3555fe009eaab3828
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3f14b377d01d8357eba032b4cabc8c1149b458b6
Fixed
524ce8b4ea8f64900b6c52b6a28df74f6bc0801e
Fixed
380ad8b7c65ea7aa10ef2258297079ed5ac1f5b6
Fixed
9deda0fcda5c1f388c5e279541850b71a2ccfcf4
Fixed
11cb63b0d1a0685e0831ae3c77223e002ef18189
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
172ba7d46c202e679f3ccb10264c67416aaeb1c4
Last affected
f5346df0591d10bc948761ca854b1fae6d2ef441

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23270.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.167
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.130
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.77
Type
ECOSYSTEM
Events
Introduced
6.8.0
Fixed
6.18.18
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.19.8

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23270.json"